Management of Criminal Justice Information Systems Course Orientation and Introduction Copyright 2007-2008 Raymond E. Foster Today’s Schedule Instructor Introduction University Education Course Outline and Expectations Website Orientation Course Beginning Copyright 2007-2008 Raymond E. Foster Copyright 2007-2008 Raymond E. Foster Copyright 2007-2008 Raymond E. Foster Copyright 2007-2008 Raymond E. Foster Copyright 2007-2008 Raymond E. Foster Contact Me Office Hours: By Appointment Office Telephone: 909.599.7530 raymond@hitechcj.com Copyright 2007-2008 Raymond E. Foster What does a university education mean? You can manage a long term project. You can work independently. You can work in a group. You can manage competing resources. You can read and write. You learned new ideas. You were exposed to a variety of cultures. You enhanced your critical thinking skills Copyright 2007-2008 Raymond E. Foster Course Objectives: This course concentrates on the introduction and use of technology in the management of criminal justice data and systems. The learner examines the issues and impacts on criminology and the criminal justice system caused by the availability and usage of technological advancements. It will also survey the trends and uses of modern technology in police response, criminal investigations, communications, response to major incidents and the administration of management and personnel data. It will examine problematic issues, impact on current laws, jurisdiction, the potential unintended consequences of technology in criminal justice management. Copyright 2007-2008 Raymond E. Foster How this Course Relates to Major • • Summarize and interpret current issues in the field of criminal justice and how these issues impact criminal justice organizations, criminal justice personnel and other stakeholders; and, Analyze, critique and defend criminal justice policy and service delivery from a management point of view. Copyright 2007-2008 Raymond E. Foster Course Specific Outcomes Compare and contrast the difference between tactical, strategic and management information in a criminal justice organization; Summarize and assess the limitations, strengths and potentials of criminal justice management technologies such as data bases, geographic information systems and a myriad of communications schemes; Develop information, technology, research and computer literacy skills through practical exercises, and course required research and assignments; Express, interpret and assess the ethical and social impact of technology and information systems on criminal justice management, stakeholders and personnel through written assignments, group presentations and individual presentations. Describe and summarize how technology has changed crime and created new types of crimes; Describe and summarize the ethical considerations of information management such as employee monitoring, search and seizure, and other contemporary issues; and, Place the role of technology and information management in a broader context by examining the historical, theoretical and practical developments of technology in criminal justice. Copyright 2007-2008 Raymond E. Foster Required Text: Foster, Raymond E. “Police Technology” Prentice Hall, July 2004 Copyright 2007-2008 Raymond E. Foster Required Supplemental Readings Your Source for Law Enforcement IT Guidance, The Police Chief, Technology Talk, May 20 Introduction to Wireless Data, Broadbeam White Paper, 2003 When They Can’t Talk, Lives Are Lost, National Institute for Justice Copyright 2007-2008 Raymond E. Foster Recommended Readings 800 MHz Public Safety Interference: The Consensus Plan Your Source for Law Enforcement IT Guidance Radio Spectrum Intranets: A New Tool for Corrections Managers Introduction to Wireless Data Improving Public Safety through Justice Information Sharing Public Safety and the Interoperability Challenge Public Safety and the Interoperability Crime Analysis in America: Findings and Recommendations DNA Testing: Foolproof ? CBS News 60 Minutes Forensic Odontology: A Global Activity A Beginner's Primer on the Investigation of Forensic Evidence Can Wiretaps Remain Cost Effective? Big Brother in the Wires Wiretapping in the Digital Age? Copyright 2007-2008 Raymond E. Foster Course Requirements: This course is organized into four modules of instruction. In this eight week session, each module is two weeks in length. A course calendar is attached as the last page of your syllabus. Each module includes specific activities and assignments. Copyright 2007-2008 Raymond E. Foster Module One Readings: 1. Chapters one through six of the primary text, Police Technology 2. Your Source for Law Enforcement IT Guidance, The Police Chief, Talk, May 20 3. Introduction to Wireless Data, Broadbeam White Paper, 2003 1. 2. 3. 4. 5. 6. 7. 8. 9. Course Orientation Video – History of Police Technology Online Forum Participation Group Project Selection Selection of individual Issue Papers (2) Lecture Individual Website Selection and Presentations Practical exercise assignments Exam One Copyright 2007-2008 Raymond E. Foster Technology Module Two Readings: 1. Chapters seven through twelve of the primary text, Police Technology 2. When They Can’t Talk, Lives Are Lost, National Institute for Justice Activities: 1. Online forum participation 2. Group Project work 3. Individual Issue Paper Research and Work 4. Issue Paper One Due 5. Lecture 6. Practical exercise roundtable discussion Copyright 2007-2008 Raymond E. Foster Module Three Readings: 1. Chapters thirteen through eighteen of primary text, Police Technology. Activities: 1. Online forum participation 2. Group Project work 3. Individual Issue Paper Research and Work 4. Issue Paper Two Due 5. Lecture 6. Exam Two Copyright 2007-2008 Raymond E. Foster Module Four Readings: 1. Chapters 19-21, if they haven’t been read for group panel discussion exercise, should be read for “audience participation.” Activities: 1. Online forum participation 2. Group Project work 3. Group Project Panel discussions. 4. Individual Issue Paper 5. Lecture Copyright 2007-2008 Raymond E. Foster Week Date Activity Assignment Due Readings Module One One Per Syllabus Course Orientation, Video, Website Assignments, Group Assignments, Lecture None Two Per Syllabus Website Presentations, Lecture, Exam One Forum participation, Website Presentations, Exam One CH1-6, Supplemental readings Module Two Three Per Syllabus Tutorial None Four Per Syllabus Practical Exercise Roundtable, lecture Exercise Roundtable, Issue Paper No. 1, forum participation CH7-12, Supplemental Reading Module Three Five Per Syllabus Tutorial None Six Per Syllabus Lecture, Exam Two Exam Two, forum participation CH13-18 Module Four Seven Eight Per Syllabus Per Syllabus Tutorial None Group Panel Discussions, WrapLecture, course evaluation. Group paper, Issue Paper No. 2, forum participation Copyright 2007-2008 Raymond E. Foster CH19-21 Method of Evaluation: Exam One Exam Two Group Project Issue Paper One Issue Paper Two Practical Exercise Website Presentation Participation Semester Total 10% 20% 20% 10% 10% 10% 10% 10% 100% Copyright 2007-2008 Raymond E. Foster A 90-100% B 80-89% C 70-79% U 69% and Under Attendance Within the university setting, learners are expected to attend class on a regular basis, complete all readings and assignments before the stated dates and participate in topic discussions to enhance their overall learning experience. As participation is directly related to attendance, and because of the abbreviated nature of the eight week session, learners missing any class will not receive credit for participation. Attendance will be recorded by a class roster that will be passed among the learners during each class. It is the learner’s responsibility to sign the roster. Copyright 2007-2008 Raymond E. Foster Ethical Conduct Learners should be aware that there are severe consequences for violations of academic ethical conduct. Primarily, we are concerned with cheating and plagiarism. Learners who are determined to have cheated or committed plagiarism will face disciplinary action as identified within UI&U regulations. For additional clarification of cheating and/or plagiarism, refer to the UI&U Catalog for policies regarding Academic Integrity. Copyright 2007-2008 Raymond E. Foster Schedule Changes The syllabus and schedule are subject to change in the event of extenuating circumstances and/or upon due notice and at the discretion of the instructor. Copyright 2007-2008 Raymond E. Foster Exam One and Two Exams one and two will consist of 50 multiple choice, true-false or fill-in the blank questions. All of the material in the exams will come from the primary text and will be cumulative. The exams are take-home, will be given out at course orientation and must be returned on the due date Copyright 2007-2008 Raymond E. Foster Issue Papers Learners are required to prepare two (2) typed, 3-5 page, papers that are a discussion and analysis of a course related issue. At a minimum, it is expected that the learners will produce an academically sound and properly formatted work (APA format is strongly encouraged); with a minimum of three sources, not including the text book. Based on the readings, the learners are required to identify two issues they would like to further explore, the topics must be discussed with the instructor. The papers will be graded on content as well as exposition. Copyright 2007-2008 Raymond E. Foster Group Project The final three chapters of the primary text book will be used as broad outline for the group project. The group project has two components. First, each group will produce an eight to ten page analysis of the assigned topic. Second, the group will lead a panel discussion on their topic. The three board areas of inquiry are: Personnel and Training; Implementing and Managing Technology; and, Emerging and Future Technologies. At a minimum, the group paper should be 8-10 pages in length. In addition to being in APA format, the group paper should address the following under these specific headings; Background; Impact of Technology; Non-technology Alternatives; Stakeholders; Outcomes and Consequences (intended and un-intended); Recommendations. The group as a panel will then present their research and findings to the class. Groups should be prepared to lead a 30 minute discussion. Copyright 2007-2008 Raymond E. Foster Individual Website Presentations Each learner will be assigned to conduct a review of one specific websites. They will then provide a ten minute presentation on the website, as well as a one-page briefing paper. The learner shall provide a copy of the briefing paper to each member of the class. The Websites are hyperlinked off the course website Copyright 2007-2008 Raymond E. Foster Participation Participation is ten percent of the learner’s final grade. In addition to attendance, participation will also be measured by the use of an online threaded discussion. Specific instructions regarding the online forum will be presented during the course orientation and are available on the course website. Copyright 2007-2008 Raymond E. Foster Practical Exercise Roundtable Discussion Depending on the size of the class, each learner will be assigned between one and three short, practical exercises. These exercises are to be completed outside of classroom time. As an example, the learner could: experiment with intrusion detection; experiment with state place coordinates; or, determine an IP address. The exact practical exercise will be assigned during class. The learner is to prepare a one paragraph description of the experience and then participate in a roundtable discussion with all class learners. At a minimum, the roundtable discussion will explore: the value of practical exercises; the potential for use in criminal justice; the potential for abuse in criminal justice; and, the limitations of the technology. Copyright 2007-2008 Raymond E. Foster Extra Credit There is no extra credit available in this course. Copyright 2007-2008 Raymond E. Foster Students with Disabilities Please refer to the Catalog for policies regarding American Disabilities’ Act or http://www.tui.edu/ASN/serv_learner_disab/default.asp for further assistance regarding UI&U compliance with ADA. Copyright 2007-2008 Raymond E. Foster General Stuff You must read the text and the supplemental material before the lecture. Reading will enhance your ability to participate Participation will increase your grade, enhance not only your learning, but your enjoyment of the class. Copyright 2007-2008 Raymond E. Foster Website The course has one companion website. At that website the students will find hyperlinks to the readings, important course downloads (such as the syllabus) and hyperlinks to other course related multimedia presentations (such as PowerPoint presentations, short videos, etc). Copyright 2007-2008 Raymond E. Foster Website www.police-technology.net Copyright 2007-2008 Raymond E. Foster Scroll Down Copyright 2007-2008 Raymond E. Foster Copyright 2007-2008 Raymond E. Foster Copyright 2007-2008 Raymond E. Foster Copyright 2007-2008 Raymond E. Foster Copyright 2007-2008 Raymond E. Foster Copyright 2007-2008 Raymond E. Foster Copyright 2007-2008 Raymond E. Foster Copyright 2007-2008 Raymond E. Foster Copyright 2007-2008 Raymond E. Foster Copyright 2007-2008 Raymond E. Foster Copyright 2007-2008 Raymond E. Foster Copyright 2007-2008 Raymond E. Foster Scroll Down Copyright 2007-2008 Raymond E. Foster Copyright 2007-2008 Raymond E. Foster Copyright 2007-2008 Raymond E. Foster Copyright 2007-2008 Raymond E. Foster Copyright 2007-2008 Raymond E. Foster Your Username First Initial, Last Name, (location), (Course) rfosterbrea410 rfosterarcadia304 rfostertwintowers410 Copyright 2007-2008 Raymond E. Foster Copyright 2007-2008 Raymond E. Foster Copyright 2007-2008 Raymond E. Foster Who Are you? Name Agency Technology experience Reason for returning to university I have always been ……………… I have always wanted to ………… Copyright 2007-2008 Raymond E. Foster